A. Allowing VMs direct access to physical network interfaces
B. Encrypting all data in transit
C. Increasing CPU utilization for network tasks
D. Decreasing the number of available network paths
A. Data encryption protocols
B. Virtual network function performance
C. Manual network troubleshooting efforts
D. Physical device management
A. Reducing the efficiency of network operations
B. Simplifying manual network configuration tasks
C. Providing high-performance, bi-directional streaming of network state information
D. Exclusively managing physical network devices
A. Physical layer diagnostics
B. Traffic analysis and monitoring
C. Network configuration
D. Data encryption
A. Security vulnerabilities
B. Speed of deployment
C. Cost only
D. Scalability and flexibility
A. Reduce the bandwidth available between sites
B. Provide layer 2 connectivity over a layer 3 network
C. Simplify network topology by eliminating virtual connections
D. Encrypt data at the transport layer
A. Physical network configurations
B. Managing network functions virtualization infrastructure
C. Direct hardware access for applications
D. Encrypting user data
A. Reduce overall cloud costs
B. Provide isolated network environments within a public cloud
C. Simplify network management
D. Decrease network security
A. Increase the physical network functions
B. Decrease network flexibility
C. Replace traditional network hardware with software
D. Physicalize software functions
A. ECMP
B. Direct connections
C. Static routing
D. Single-path